US 11,853,290 B2
Anomaly detection
Kumar Saurabh, Sunnyvale, CA (US); David M. Andrzejewski, San Francisco, CA (US); Yuchen Zhao, San Mateo, CA (US); Christian Friedrich Beedgen, Mountain View, CA (US); and Bruno Kurtic, San Mateo, CA (US)
Assigned to Sumo Logic, Inc., Redwood City, CA (US)
Filed by Sumo Logic, Inc., Redwood City, CA (US)
Filed on Mar. 17, 2022, as Appl. No. 17/697,213.
Application 17/697,213 is a continuation of application No. 16/543,383, filed on Aug. 16, 2019, granted, now 11,314,723.
Application 16/543,383 is a continuation of application No. 14/318,409, filed on Jun. 27, 2014, granted, now 10,445,311.
Claims priority of provisional application 61/920,312, filed on Dec. 23, 2013.
Claims priority of provisional application 61/876,722, filed on Sep. 11, 2013.
Prior Publication US 2022/0207020 A1, Jun. 30, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 16/23 (2019.01)
CPC G06F 16/2365 (2019.01) 18 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
identifying a first plurality of log entries received over a predefined period of time;
categorizing each log entry from the first plurality of log entries, into a category from a plurality of categories; based on a signature of the log entry, wherein the signature is based on a printf statement configured to generate log entries associated with the signature;
creating a baseline based on a number of log entries in each category, the baseline being a representative quantity received over the predefined period of time;
identifying a second plurality of log entries;
categorizing each log entry from the second plurality of log entries;
detecting an anomaly in one category from the plurality of categories based on a count of log entries from the second plurality of log entries in the category deviating from the count of log entries from the first plurality of log entries in the category by a predetermined threshold; and
causing presentation on a user interface (UI) of the detected anomaly; wherein causing presentation on a user interface (UI) of the detected anomaly further comprises:
presenting in the UI log entries with a signature not present in the baseline with a label indicating the log entries that are new; and
presenting logs missing from the baseline with a label of gone.